A security administrator is selecting an MDM solution for an organization, which has strict security requirements for the confidentiality of its data on end user devices. The organization decides to allow BYOD, but requires that users wishing to participate agree to the following specific device configurations; camera disablement, password enforcement, and application whitelisting. The organization must be able to support a device portfolio of differing mobile operating systems. Which of the following represents the MOST relevant technical security criteria for the MDM?
A. Breadth of support for device manufacturers’ security configuration APIS
B. Ability to extend the enterprise password polices to the chosen MDM
C. Features to support the backup and recovery of the stored corporate data
D. Capability to require the users to accept an AUP prior to device onboarding